General
-
Target
2a20f09d92358c8cb1fd0dd9fc9c0e3c9c010531b12d9fde51b06fc60bdb68c6
-
Size
408KB
-
Sample
240507-pfj41ahh89
-
MD5
e25b22d107eeee92c8309c1cb6f38a6b
-
SHA1
8168cb78c261d3eeaa91fdb41c885cdcacccdcb0
-
SHA256
2a20f09d92358c8cb1fd0dd9fc9c0e3c9c010531b12d9fde51b06fc60bdb68c6
-
SHA512
fb2782e81c07f13b1d03749b7e39c0684a234ef86ebcc1c6fc73f2c4fc24d90c594a97ee99e32ddfec6475e60c2ba27c4c20c7897ad2e6b2e52b34b90b6e3ead
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxq:FBrsNe+mLRvdSL+0VRZDTks2xq
Static task
static1
Behavioral task
behavioral1
Sample
2a20f09d92358c8cb1fd0dd9fc9c0e3c9c010531b12d9fde51b06fc60bdb68c6.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2a20f09d92358c8cb1fd0dd9fc9c0e3c9c010531b12d9fde51b06fc60bdb68c6
-
Size
408KB
-
MD5
e25b22d107eeee92c8309c1cb6f38a6b
-
SHA1
8168cb78c261d3eeaa91fdb41c885cdcacccdcb0
-
SHA256
2a20f09d92358c8cb1fd0dd9fc9c0e3c9c010531b12d9fde51b06fc60bdb68c6
-
SHA512
fb2782e81c07f13b1d03749b7e39c0684a234ef86ebcc1c6fc73f2c4fc24d90c594a97ee99e32ddfec6475e60c2ba27c4c20c7897ad2e6b2e52b34b90b6e3ead
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxq:FBrsNe+mLRvdSL+0VRZDTks2xq
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-